ruchikagargdiwakar / ml_cyber_security_usecasesLinks
This project contains files for cyber security
☆33Updated 6 years ago
Alternatives and similar repositories for ml_cyber_security_usecases
Users that are interested in ml_cyber_security_usecases are comparing it to the libraries listed below
Sorting:
- Cyber Attack Detection thanks to Machine Learning Algorithms☆104Updated 5 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 5 years ago
- ☆60Updated 3 years ago
- Adversarial Malware Generator Using GANs☆54Updated 10 months ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆68Updated 6 years ago
- ☆32Updated 4 years ago
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆206Updated last year
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆106Updated 10 months ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- ICS Cybersecurity PCAP respository☆53Updated 6 years ago
- Multi-class malware classification using Deep Learning☆77Updated 4 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆92Updated last year
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆16Updated 4 years ago
- ☆23Updated 3 years ago
- Transfer Learning for Image-Based Malware Classification☆46Updated 3 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆81Updated last year
- ☆16Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- This project contains 10010 ELF files (6165 IoT Botnet of different variant and 3845 benign files)☆9Updated 6 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆57Updated 2 years ago
- CNN based android malware detection system☆22Updated 5 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆69Updated 4 years ago
- This project is Malware detection API using ML and CNN techniques☆24Updated 2 years ago
- ☆30Updated 2 years ago
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- A system which has a real-time & light-weight anomaly detection algorithm based on streaming data from UAV sensors in to order to get the…☆10Updated 5 years ago
- A Deep Learning framework that analyses Windows PE files to detect malicious Softwares.☆73Updated 2 years ago